- Synchronized data.

This commit is contained in:
CVE Team 2019-02-25 21:04:14 -05:00
parent f9b9c8dafe
commit 0307e8559b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
3 changed files with 236 additions and 0 deletions

View File

@ -0,0 +1,92 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2009-5155",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272",
"refsource" : "MISC",
"url" : "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272"
},
{
"name" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793",
"refsource" : "MISC",
"url" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793"
},
{
"name" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806",
"refsource" : "MISC",
"url" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806"
},
{
"name" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238",
"refsource" : "MISC",
"url" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238"
},
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=11053",
"refsource" : "MISC",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=11053"
},
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=18986",
"refsource" : "MISC",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=18986"
},
{
"name" : "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672",
"refsource" : "MISC",
"url" : "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-20796",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+' in grep."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141",
"refsource" : "MISC",
"url" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141"
},
{
"name" : "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html",
"refsource" : "MISC",
"url" : "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html"
}
]
}
}

View File

@ -0,0 +1,77 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-9169",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140",
"refsource" : "MISC",
"url" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140"
},
{
"name" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142",
"refsource" : "MISC",
"url" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142"
},
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=24114",
"refsource" : "MISC",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=24114"
},
{
"name" : "https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9",
"refsource" : "MISC",
"url" : "https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9"
}
]
}
}